Analysis
-
max time kernel
38s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe
Resource
win10v2004-20220812-en
General
-
Target
f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe
-
Size
69KB
-
MD5
bc3812883dc8c0dc2e55f8a7aa6fe782
-
SHA1
cb61c72b438b5f4566c474a262518892521068cb
-
SHA256
f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
-
SHA512
fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
SSDEEP
1536:Fq3ZufbLDnb+Qnu+LKaLrEStwqjWKNaXEl4He2C:s3ZufbnnbdLKWrzjvNaXc2
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1760 winrsc.exe -
resource yara_rule behavioral1/memory/684-57-0x0000000029A00000-0x0000000029A2C000-memory.dmp upx behavioral1/memory/684-63-0x0000000029A00000-0x0000000029A2C000-memory.dmp upx behavioral1/memory/684-74-0x0000000029A00000-0x0000000029A2C000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System Monitor = "C:\\Windows\\system\\winrsc.exe" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\winrsc.exe f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe File opened for modification C:\Windows\system\winrsc.exe f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2028 1760 WerFault.exe 29 -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT\Software f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1584 wrote to memory of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 PID 1584 wrote to memory of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 PID 1584 wrote to memory of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 PID 1584 wrote to memory of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 PID 1584 wrote to memory of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 PID 1584 wrote to memory of 684 1584 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 28 PID 684 wrote to memory of 1760 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 29 PID 684 wrote to memory of 1760 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 29 PID 684 wrote to memory of 1760 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 29 PID 684 wrote to memory of 1760 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 29 PID 1760 wrote to memory of 2028 1760 winrsc.exe 30 PID 1760 wrote to memory of 2028 1760 winrsc.exe 30 PID 1760 wrote to memory of 2028 1760 winrsc.exe 30 PID 1760 wrote to memory of 2028 1760 winrsc.exe 30 PID 684 wrote to memory of 1824 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 31 PID 684 wrote to memory of 1824 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 31 PID 684 wrote to memory of 1824 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 31 PID 684 wrote to memory of 1824 684 f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe"C:\Users\Admin\AppData\Local\Temp\f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe"C:\Users\Admin\AppData\Local\Temp\f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33.exe"2⤵
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system\winrsc.exe"C:\Windows\system\winrsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 1204⤵
- Loads dropped DLL
- Program crash
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\F18795~1.EXE > nul3⤵PID:1824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0
-
Filesize
69KB
MD5bc3812883dc8c0dc2e55f8a7aa6fe782
SHA1cb61c72b438b5f4566c474a262518892521068cb
SHA256f1879599f1fde03fa1f1db46364c2d0ff67e79507094f36b413790fe72159e33
SHA512fafad395e94c0d647b00613dc91ddcdfd86ad2d0aa957f0c760330e02eecceb5367b34c4a4e77aef767bd6a059757c1cd83495f50c08c5219a8185ee7ae86cc0